Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2009 patent applcation highlights part 58
Patent application numberTitlePublished
20090144715SYNCHRONOUS BUS DOWNLOAD OF TV SOFTWARE UPDATE - TV software can be updated by receiving updated from a USB drive or wirelessly, in either case preferably over a synchronous bus for speedier data transfer.2009-06-04
20090144716PATCH ATTACHMENT FACILITY - A computer-based system can comprise a patch management system to a load patch to a software program; and an installer to install components of the software program. The installer can interpret metadata to instruct the patch management system to automatically load the patch to the software program.2009-06-04
20090144717INTEGRATION OF AN EXTERNAL SOFTWARE APPLICATION(S) WITH A SCALE SOFTWARE APPLICATION - A Scale Integration Framework that allows secondary applications installed on a PC-based scale or at a remote location to interact with a Scale Application that controls the scale equipment in accordance with applicable requirements. The scale integration framework comprises a plurality of Integration Points within the Scale Application such that other value added applications can interact with the Scale Application at these Integration Points.2009-06-04
20090144718SYSTEMS AND METHODS FOR UPDATING SOFTWARE APPLIANCES - Embodiments relate to systems and methods for updating software appliances. A client can host a software appliance, such a Linux™ software appliance, which a user wishes to update to a newer version. Instead of performing an in-place update by installing a new version that deletes the configuration state and/or user data of the existing version of the appliance, an export module takes an image of an initial appliance installation and then registers further changes to the configuration state and/or user data over time. When the user chooses to update the software appliance, the new version can be downloaded to execute an installation. The export module aggregates all changes to the original installation image as well as user data, and delivers the complete current configuration state and/or complete current user data to the new version of the appliance to instantiate the new version.2009-06-04
20090144719USING SYSTEM FINGERPRINTS TO ACCELERATE PACKAGE DEPENDENCY RESOLUTION - A computer system can be updated and/or reconfigured quickly by preparing a list of attributes of the system and computing a fingerprint based on the list. The fingerprint serves as a key to a database of precomputed upgrade plans. If a matching plan is found, it can be executed to update the computer system without performing a time-consuming dependency resolution operation. If no applicable precomputed plan is found, a plan must then be computed, but the computed plan may be saved in the database to speed up future system updates.2009-06-04
20090144720CLUSTER SOFTWARE UPGRADES - A device, system, and method are directed towards upgrading software on a cluster. A cluster of nodes is divided into two partitions. The first partition is brought offline, and the software on each of its nodes is updated. The nodes are partially initialized and form an offline cluster, leaving uninitialized subsystems that share external resources or external communication. The second partition is brought offline. The nodes of the first partition complete their initialization and the first partition cluster is brought online. The nodes of the second partition are updated and join the first partition cluster. Quorum mechanisms are adjusted to allow each partition to operate as a cluster. The system thereby updates each node of the cluster with minimal time offline and without requiring software of different versions to intercommunicate.2009-06-04
20090144721SYSTEM AND METHOD FOR PROVIDING SOFTWARE UPGRADES - A method and system provide a business scenario. The method includes executing a first deployment unit on a first application platform. The method includes replacing an original second deployment with an upgraded second deployment unit on an upgraded second application platform. The method includes executing the upgraded second deployment unit. The method including transmitting messages related to the business scenario over a communications link between the first deployment unit and the upgraded second deployment unit. The method includes storing master data related to the business scenario in a data storage.2009-06-04
20090144722Automatic full install upgrade of a network appliance - A method and apparatus for upgrading a network appliance. In one embodiment, a network appliance determines that it should be upgraded using a full install image. The network appliance then reserves an upgrade staging area in its memory device, downloads the full install image from a server to the upgrade staging area, and marks the upgrade staging area as bootable. Further, the network appliance reboots itself, and installs the full install image.2009-06-04
20090144723Dynamic Updateable Web Toolbar - A toolbar that persists in a browser window across multiple Web pages during a browsing session is displayed. This toolbar includes multiple toolbar buttons. An updated toolbar is automatically received from a remote toolbar source that is independent of the multiple Web pages, and this updated toolbar includes a change to the toolbar buttons. The toolbar in the browser is replaced, during the browsing session, with this updated toolbar. The toolbar can also include one or more buttons based at least in part on customization information regarding a user of the browser.2009-06-04
20090144724Dynamic updates of message consumers - A message is received at a message consumer, the received message having a component dependency identification that indicates a version of a software component that is necessary to process the message. The version of the software component is automatically downloaded if the message consumer does not already include the version of the software component. The version of the software component is then used to process the received message.2009-06-04
20090144725Method and System for Software Installation - A method for installing software on an information handling system (IHS) is provided, the method including receiving data associated with a plurality of hardware components and a plurality of software components, providing a plurality of software devices corresponding to the data, transferring the plurality of software devices to a virtual hard drive of a virtual machine and capturing an image of the virtual hard drive on an image storage.2009-06-04
20090144726USE OF ALIASING IN AN INSTALLER - An installer can use an alias to indicate a combined software program. The combined program can include multiple software products. The software products can each be independently runnable. The alias can be used by the installer system to install the multiple software products automatically.2009-06-04
20090144727INTERPRETED MULTIPLE PRODUCT INSTALLATION - An installer can do a combined installation of multiple software products. The installer can do a combined pre-install phase, a combined install phase, and a combined post-install phase for the multiple software products.2009-06-04
20090144728MODULE BASED SOFTWARE SYSTEM LINKING RUNTIME TO INSTALL TIME - A software product can comprise multiple components. At least one component comprising multiple feature sets. The feature sets can each define multiple OSGi bundles. The installation can include installing the OSGi bundles as indicated by the feature sets. The runtime can include loading the OSGi bundles as indicated by the feature sets.2009-06-04
20090144729Portable business process deployment model across different application servers - A method and apparatus for providing portability of a business process deployment model across different application servers. In one embodiment, a method may include determining which application server will be used for deploying a business process as a web application, and invoking an implementation framework of application server interfaces that corresponds to this application server. The method may further include utilizing the invoked implementation framework to obtain application server information needed for deploying the business process as a web application, and generating a web application package using the application server information.2009-06-04
20090144730SOFTWARE DEPLOYMENT METHOD AND SYSTEM, SOFTWARE DEPLOYMENT SERVER AND USER SERVER - A software deployment method creates and provides an installation parameter file for each computer to be deployed according to a software deployment task. The installation parameter file of each computer to be deployed is used to guide a network installation of software on the computer. A corresponding software deployment system, a software deployment server, and a software deployment user server are also provided. The installation parameter files are generated collectively according to the software deployment tasks, so that the computer equipment is guided by the installation parameter file to install the software automatically. Therefore, the software deployment on the computers in batches is more convenient. Moreover, as the installation parameter file corresponds to each computer to be deployed, the software type and the parameter configuration of each computer to be deployed can be adjusted flexibly, which facilitates the customization of the software.2009-06-04
20090144731SYSTEM AND METHOD FOR DISTRIBUTION OF RESOURCES FOR AN I/O VIRTUALIZED (IOV) ADAPTER AND MANAGEMENT OF THE ADAPTER THROUGH AN IOV MANAGEMENT PARTITION - The system and method address the situation where an input/output (I/O) fabric is shared by more than one logical partition (LPAR) and where each LPAR can share with the other LPARs an I/O adapter (IOA). In particular, each LPAR is assigned its own separate address space to access a virtual function (VF) assigned to it such that each LPAR's perception is that it has its own independent IOA. Each VF may be shared across multiple LPARs. Facilities are provided for management of the shared resources of the IOA via a Physical Function (PF) of the IOA by assignment of that PF to an I/O Virtualization Management Partition (IMP). The code running in the IMP acts as a virtual intermediary to the VFs for fully managing the VF error handling, VF reset, and configuration operations. The IMP also acts as an interface to the PF for accessing common VF functionality. Furthermore, the functions of resource assignment and management relative to the VFs and the client partitions that use those VFs, which might normally be done by an entity like a hypervisor, are implemented by this IMP.2009-06-04
20090144732COMPUTER AND METHOD FOR CONTROLLING WHETHER OR NOT TO RELEASE ALL REAL STORAGE AREAS ASSIGNED TO VIRTUAL VOLUME - The management server performs a release/non-release selection determining whether or not to release all of the real storage areas assigned to a virtual volume switched from a used target to an unused target. The management server exercises control to determine whether or not to release all of the real storage areas assigned to the specified virtual volume in accordance with the result of the release/non-release selection.2009-06-04
20090144733VIRTUAL MACHINE SYSTEM AND CONTROL METHOD OF VIRTUAL MACHINE SYSTEM - A virtual machine system and a control method for the virtual machine system. An instruction causing a protection exception is analyzed by the protection exception process by accessing at least a virtual device, while judging whether the optimum emulated code is executed for each function on the virtual device. If the optimum emulated code is executable, the cause of the protection exception is stored in a memory and the optimum emulated code is executed, while at the same time judging whether the cause stored in the memory is usable for the next and subsequent protection exception processes. If the cause is so usable, the optimum emulated code is executed while omitting process having a large processing amount thereby to reduce the amount of the protection exception process. The stored contents of the cause of the protection exception are compared with the contents of the instruction analyzed, and ife the cause held is not reusable, the cause of the protection exception is deleted.2009-06-04
20090144734METHOD AND IMPLEMENTATION OF AUTOMATIC PROCESSOR UPGRADE - A method for automatically adding capacity to a computer for a workload is provided. Metric information is received, defined in a policy, about a workload running on a computer. Capacity information for the computer is retrieved and is serialized in a serialized list in accordance with the policy. A demand for the workload is received and is a request for additional capacity of the computer. The demand for the workload is analyzed to determine whether the demand is characterized as a speed or a general purpose demand. Speed demand includes an increase in a speed level for the computer, and general purpose demand includes an increase in a speed level and/or a number of processors for the computer. An appropriate capacity is determined, from the serialized list, to add to the computer for the workload based on the analysis. The appropriate capacity of the computer is activated for the workload.2009-06-04
20090144735APPARATUS AND METHOD FOR GENERATING USER INTERFACE BASED ON TASK SERVICE - An apparatus for generating a task-based UI includes a task ontology unit for maintaining task information with respect to the task, a device ontology unit for maintaining device information with respect to a device, a UI description generation unit for reading the task information and/or the device information using the task ontology unit and/or the device ontology unit, respectively, and generating UI description information from the read task information and/or the read device information, the UI description information being made by a task-based language, and a UI description parsing unit for parsing the UI description information to output the task-based UI.2009-06-04
20090144736Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - A method for evaluating performance of DMA-based algorithmic tasks on a target multi-core processing system includes the steps of: inputting a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; evaluating performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and providing results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system.2009-06-04
20090144737DYNAMIC SWITCHING OF MULTITHREADED PROCESSOR BETWEEN SINGLE THREADED AND SIMULTANEOUS MULTITHREADED MODES - An apparatus and program product utilize a multithreaded processor having at least one hardware thread among a plurality of hardware threads that is capable of being selectively activated and deactivated responsive to a control circuit. The control circuit additionally provides the capability of controlling how an inactive thread can be activated after the thread has been deactivated, e.g., by enabling or disabling reactivation in response to an interrupt.2009-06-04
20090144738Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - Apparatus for evaluating the performance of DMA-based algorithmic tasks on a target multi-core processing system includes a memory and at least one processor coupled to the memory. The processor is operative: to input a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; to evaluate performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and to provide results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system.2009-06-04
20090144739PERSISTENT SCHEDULING TECHNIQUES - Techniques for persistent scheduling are provided. A principal registers a schedule with a network-based scheduling service. The scheduling service determines when a trigger is to be sent to a client associated with the principal for purposes of having that client process a particular action. The trigger is sent when the client is detected as being online; and when the client is offline, the trigger is sent as soon as the client comes online. Furthermore, once a trigger is successfully sent, a current date and time that the trigger was sent is maintained with the schedule for the client.2009-06-04
20090144740Application-based enhancement to inter-user priority services for public safety market - A system and method for application based enhancement to the traditional per-user based inter-user priority services is provided. This method includes provisioning a user's profile, not only with an assigned inter-user priority, but also with zero, one or more specified and provisioned applications that are considered as critical applications which require special preferential treatment by the access network. The method continues with accessing the inter-user priority profile associated for sessions established for the user. The system then recognizes that a session may have been assigned to at least one provisioned critical application. The system may then provide inter-user priority services operative to provide the specified preferential treatment for at least the critical applications associated with the session when the critical application(s) are activated. In this form, the critical applications are better served including protection again congestion and availability of resources whenever they are needed. This system may grant preferential treatment on a session and/or application basis so that there will be no impact on other general applications when no critical applications are activated. This is especially useful for public safety implementation where protecting the mission-critical communication is a fundamental requirement.2009-06-04
20090144741RESOURCE ALLOCATING METHOD, RESOURCE ALLOCATION PROGRAM, AND OPERATION MANAGING APPARATUS - An operation managing apparatus totalizes necessary resource amount information every the service so as to acquire necessary resource amount information every BP, and identifies the necessary resource amount information every the BP with resource amount information which can be utilized with respect to each of the service executing apparatuses so as to retrieve such service executing apparatuses capable of providing resource amounts by which the necessary resource amount information every the BP is stored. When the service executing apparatuses are retrieved, the operation managing apparatus allocates a service to the retrieved service executing apparatuses, whereas when the service executing apparatuses are not retrieved, the operation managing apparatus allocates the services to plural sets of the service executing apparatuses.2009-06-04
20090144742METHOD, SYSTEM AND COMPUTER PROGRAM TO OPTIMIZE DETERMINISTIC EVENT RECORD AND REPLAY - A method, system and computer-usable medium for managing task events during the scheduling period of a task executing on one of the CPUs of a multi-processor computer. Only events of specific portions of scheduling period are logged, wherein a first shared resource access has been granted for the task, this portion of scheduling period gathering all the non-deterministic events which cannot be replayed by simple task re-execution. Other independent non-deterministic event records are still logged as usual when they occur out of the portion of scheduling period for which a record has been created. This limits the number of logged events during recording session of an application and the frequency of events to transmit from the production machine to the replay machine.2009-06-04
20090144743Mailbox Configuration Mechanism - An email configuration system may use a topology database to determine if a change request results in a valid configuration. The topology database may contain a definition of an enterprise email system, including forests, servers, and individual mailboxes. If a valid configuration is found, a change request may be scheduled and implemented. The email configuration system may store the change request so that a change may be undone at a later time. Changes may be implemented to the enterprise mail system by changing the topology definition and running an analysis of the current topology and a desired topology.2009-06-04
20090144744Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - A method for evaluating performance of DMA-based algorithmic tasks on a target multi-core processing system includes the steps of: inputting a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; evaluating performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and providing results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system.2009-06-04
20090144745Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - Apparatus for evaluating the performance of DMA-based algorithmic tasks on a target multi-core processing system includes a memory and at least one processor coupled to the memory. The processor is operative: to input a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; to evaluate performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and to provide results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system.2009-06-04
20090144746ADJUSTING WORKLOAD TO ACCOMMODATE SPECULATIVE THREAD START-UP COST - Methods and apparatus provide for a workload adjuster to estimate the startup cost of one or more non-main threads of loop execution and to estimate the amount of workload to be migrated between different threads. Upon deciding to parallelize the execution of a loop, the workload adjuster creates a scheduling policy with a workload for a main thread and workloads for respective non-main threads. The scheduling policy distributes iterations of a parallelized loop to the workload of the main thread and iterations of the parallelized loop to the workloads of the non-main threads. The workload adjuster evaluates a start-up cost of the workload of a non-main thread and, based on the start-up cost, migrates a portion of the workload for that non-main thread to the main thread's workload.2009-06-04
20090144747COMPUTATION OF ELEMENTWISE EXPRESSION IN PARALLEL - An exemplary embodiment provides methods, systems and mediums for executing arithmetic expressions that represent elementwise operations. An exemplary embodiment provides a computing environment in which elementwise expressions may be executed in parallel by multiple execution units. In an exemplary embodiment, multiple execution units may reside on a network.2009-06-04
20090144748METHODS AND APPARATUS FOR PARALLEL PIPELINING AND WIDTH PROCESSING - Computer apparatus for use with a database management system and database, the apparatus comprising a CPU and a memory, the apparatus configured to provide at least two task processes each process being apportioned a section of the memory when is use, wherein in response to the database management system or apparatus being instructed to carry out a first task, such as reading, and a second task, such as decryption, on a section of data in series, a first task process is configured to begin the first task on a first part of the section of data in the database and (after a the first process on the first part of the section of the data is complete); a second task process is instructed to carry out the first task on a second part of the section of data which begins where the first part ends, and when the first task is complete and the first task process switched to carry out the second task on data on which the first task has already been carried out, or the second process is instructed to carry out the second task on the first part whilst the first process switches to carry out the first task on the second part of the data, or the second task process is instructed to carry out the first task on a second part of the section of data the first task process is switched to pipeline the second task to a third task process.2009-06-04
20090144749Alert and Repair System for Data Scraping Routines - A system and method of detecting and reporting the failure of a data scrape or redirect routine. In the event of a failure, the system may reattempt a data scrape based on different parameters. Such a system and method may further provide for the repair or replacement of failed routines with new or pre-existing routines.2009-06-04
20090144750Commit-one-phase distributed transactions with multiple starting participants - A commit query is sent from a coordinator of a two-phase commit distributed transaction to each participant of the distributed transaction, wherein each participant can respond with one of a commit message, an abort message, or a read-only message. A read-only message is received from all but one participant of the distributed transaction. A one-phase commit distributed transaction is initiated for the one participant that did not respond with a read-only message.2009-06-04
20090144751AUTOMATIC DISCOVERY OF THE JAVA CLASSLOADER DELEGATION HIERARCHY - A computer implemented method, data processing system, and computer program product for automatic discovery of the Java classloader delegation hierarchy. One or more classloaders are instrumented with byte code instrumentation code such that a delegation event is received each time a classloader delegates a resource finding method to a parent classloader of the classloader. From each delegation event received, the classloader that generated the delegation event and a parent classloader to which the classloader directly delegates the resource finding method is determined. Based on the delegation events received, the classloaders to which a current classloader in the one or more classloaders can directly delegate are determined. The order of delegation to the classloaders may then be determined.2009-06-04
20090144752UNMANAGED-TO-MANAGED AGGREGATION - Various technologies and techniques are disclosed for providing communication between managed objects across application domains. When a determination is made that a communication from a first managed object to a second managed object on a different application domain is needed, an unmanaged aggregation object is created. An aggregation process is used to aggregate the second unmanaged object with the unmanaged aggregation object. Calls are then passed from the first managed object through the unmanaged aggregation object to the second managed object. The second managed object appears to be an unmanaged object through use of the unmanaged aggregation object.2009-06-04
20090144753Method And System For Providing Update Content In A Markup Language-Based Resource - Methods, systems and computer program products are described for providing update content in a markup language-based resource. One method includes providing to a client a markup language based resource including an event element defined in the markup language. The event element identifies an event and directs the client to detect the identified event at the client in association with presenting the resource as a page by the client. The event element also includes information identifying a remote content provider for providing update content for an updatable portion of the resource. The method also includes receiving an indication that the identified event is detected in association with presenting the resource at the client, and in response to receiving the indication, providing for the identified remote content provider to provide update content for the updatable portion of the resource.2009-06-04
20090144754BIOS ROUTINE AVOIDANCE - A method, computer readable medium, and device are disclosed. In one embodiment the method includes determining whether an entry exists in a firmware interface table to direct the processor to handle the event in a non-legacy mode. This is done after an event for a processor that triggers a legacy mode processor handling routine. The method also includes the processor handling the event in the non-legacy mode when the entry exists.2009-06-04
20090144755RETRIEVING DIAGNOSTICS INFORMATION IN AN N-WAY CLUSTERED RAID SUBSYSTEM - A method and system for reading exception data by a storage server from a storage controller. An exception event is detected at the storage server. The storage server registers with the controller, such that only one storage server can read the exception data at a time. If the storage server is registered with the controller, the storage server reads the exception data. If the storage server does not successfully register with the controller, the controller keeps track of which storage servers have not read the exception data, to ensure that all storage servers can read the data.2009-06-04
20090144756CONFLICT RESOLUTION APPARATUS - Provided is a conflict resolution apparatus which automatically updates an application conflict rule specifying a conflict condition among applications when a device is installed or uninstalled. An application conflict rule storage section (2009-06-04
20090144757Method and Apparatus for Adapting and Hosting Legacy User Interface Controls - A method and apparatus for adapting and hosting legacy user interface controls is provided. Legacy user interface controls are exposed within a new window manager as native user interface objects. A bridge between a hosted legacy user interface control and the legacy window manager intercepts messages intended for the hosted user interface control. The messages are filtered to determine if they should be passed to the new window manager. If a message is to be forwarded, the message is forwarded to a root Visual Gadget in the new window manager. The message is processed and routed down the window tree to an adapter control for hosting the legacy user interface control. The adapter control processes the message and routes the message to any listener objects attached to the adapter. If the message has not been completely handled, the message is “bubbled” up the window tree for additional processing.2009-06-04
20090144758ADMINISTRATION DEVICE FOR IMAGE PROCESSING DEVICE USES PLUG-IN APPLICATION - When a plug-in application “HDD Backup Utility” is designated by the user from the start menu, an administration program is started. The administration program receives information as to which plug-in application was designated, and based on the received information, places a function button for the designated plug-in application (here, “backup” and “restore” buttons corresponding to HDD Backup Utility) in a “HOME” display area. The user can readily find and select the button in the HOME display area. In this manner, the function button for the designated plug-in application is displayed in the position easily accessible by the user.2009-06-04
20090144759Method and system for creating and providing a multi-tier networked service - A multi-tier application for interaction with a user interface, such as a browser on a PC or PDA. The application comprises a presentation tier (such as a web server with a JSP/servlet engine) and a business logic tier (such as an application server) to manipulate data for subsequent presentation on the user interface. A direction module has a plurality of coupled directions, including a function direction to direct a corresponding functional component to perform a data processing function using the business logic tier and provide a data processing output, and a presentation direction to direct a corresponding presentation component to incorporate the data processing output, when applicable, into a presentation template to produce a presentation element for the user interface. The function component and presentation component are independent and separate from each other, the connection being the function component produces the data and the presentation component consumes the output data. The presentation component is an abstract representation of a general kind of presentation element, each specific presentation element having its layout and format (such as markup language) stored in a different presentation template, and the reference to a specific presentation template for the presentation component can be determined at processing time in the presentation tier.2009-06-04
20090144760OPTICAL DISC DEVICE - An optical disc device capable of removing an optical disc not to damage an optical disc and an optical disc device even if two piled optical discs are inserted into the optical disc device is provided. Even if two piled optical discs 2009-06-04
20090144761Disc drive device - A disc drive device includes a disc conveyance mechanism, a slide cam and a trigger slider. The disc conveyance mechanism has a cam driven element protruded on a movement route of the slide cam and a conveyance roller energized in a direction coming into pressure-contact with a disc by an elastic member. The slide cam has a cam contour part moving the conveyance roller in a direction being spaced apart from the disc against an elastic force of the elastic member while pressing the cam driven element. The cam contour part has a flat surface part formed in parallel to a moving direction of the slide cam, in order to move only the trigger slider, while restraining the slide cam by contact pressure of the cam driven element to stop the slide cam temporary, when conveying the disc inside a cabinet toward an aperture side of the cabinet.2009-06-04
20090144762Method for determining size of optical disc inserted into optical disc drive - A method of determining a size of an optical disc inserted into an optical disc drive is disclosed. The method includes driving a turntable motor of the optical disc drive to rotate the optical disc at a predetermined rotation frequency for reading data stored on the optical disc, measuring a rotation frequency of the turntable motor, applying a kick-pulse voltage to the turntable motor of the optical disc drive for a predetermined period of time, measuring a change in the rotation frequency of the turntable motor after applying the kick-pulse voltage, comparing the change in the rotation frequency of the turntable motor to a threshold value, and determining that the optical disc is an 8 cm disc when the change in the rotation frequency of the turntable motor is above the threshold value.2009-06-04
20090144763Small form factor optical data storage disc and disc drive for use in mobile electronic device - An optical data storage disc measuring 32 mm in diameter contains 1 GB of data per layer. The data is designed to be readable by a disc drive that contains a blue wavelength laser, an objective lens having a numerical aperture of 0.72 and conventional DVD controller electronics. This combination of elements allows a full-length movie or a video game to be displayed with DVD-quality on a cell phone or other portable hand held device.2009-06-04
20090144764BILLING ADJUSTMENT SYSTEM FOR MULTIMEDIA CONTENT - A system and method is disclosed for processing refund requests. For IPTV broadcast programs, refund requests initiated by users may be for pay-per-view or on-demand programs. After accepting the refund request, user information and historical event information for the provider network are collected and analyzed using a set of rules. The refund request may be granted or denied, either in whole or in part, based on the user information and the historical event information. In addition, detection of network outages and service interruptions is correlated to the refund requests, whereby remediation service may be initiated for network components determined to be in a fault condition.2009-06-04
20090144765SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR PERIODIC-FEE LIMITED ACCESS TO VIDEOS - Systems, methods and computer products for providing periodic fee limited access to videos via Internet Protocol Television. Exemplary embodiments include a method for providing video, the method including receiving a request to download a video to a communications device via an Internet-Protocol-enabled connection,, determining whether the download is permitted based on a periodic fee arrangement for providing the video to the communications device and providing the video to the communications device in response to a determination that the download is permitted.2009-06-04
20090144766METHOD AND APPARATUS FOR MULTI-STREAM PROCESSING OF SET TOP BOX IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - A multi-stream processing apparatus of a set top box in a Downloadable Conditional Access System (DCAS), the apparatus including: a cable modem (CM) to allocate at least one communication channel with respect to a headend of a broadcasting company connected with a cable network; a demodulator to receive broadcasting information from the cable network using the at least one allocated communication channel and to demodulate the received broadcasting information; a security module to descramble the demodulated broadcasting information using an application downloaded from the headend of the broadcasting company; a decoder to restore the descrambled broadcasting information into an Audio/Video (A/V) signal and to transmit the A/V signal to a connected apparatus; and a software module to control the CM, the security module, the demodulator, and the decoder, and to perform routing of information.2009-06-04
20090144767METHOD FOR SWITCHING BETWEEN MINOR CHANNELS FOR DIGITAL TELEVISIONS - A method for switching between minor channels for digital televisions is disclosed. The method includes determining whether a minor channel is in a non-signal state, analyzing information of a major channel, to which the minor channel in the non-signal state pertains, if the minor channel is in the non-signal state, followed by obtaining information of minor channels pertaining to the major channel, and selecting other minor channels excluding the minor channel in the non-signal state based on an analysis of the information of the minor channels to sequentially determine whether the selected minor channels are in a signal state, followed by switching from the minor channel in the non-signal state to a minor channel in the signal state if a minor channel in the signal state is present.2009-06-04
20090144768MAPPING MOBILE DEVICE ELECTRONIC PROGRAM GUIDE TO CONTENT - A user computing device, such as mobile device, is provided with an electronic program guide (EPG). The EPG lists video content that is available or being broadcast on one or more websites. The video content may be considered to be premium content or user content. Premium content may be video content that is available from the website of a commercial broadcaster. Premium content may be generated by the commercial broadcaster. User content may be video content that has been generated and provided to websites for viewing and sharing by users such as members of the websites. An EPG may display listings of both user content and premium content.2009-06-04
20090144769Digital Video Recording Device and Method - A multi-media content playback method comprising: detecting a user request to play-back stored multi-media content for a selected program; determining whether a loss of signal (LOS) condition is associated with the stored multi-media content; and if a LOS condition is determined to be associated, alerting the user, prior to play-back of the stored multi-media content, that at least a portion of the multi-media content for the selected program is missing.2009-06-04
20090144770APPARATUS FOR PROCESSING ELECTRONIC PROGRAM GUIDE INFORMATION, SYSTEM FOR RECEIVING DIGITAL BROADCASTS, AND METHOD FOR PROCESSING PROGRAM INFORMATION - A apparatus for processing EPG information that EPG (Electronic Program Guide) information can be read prior to display independently of an operation by an input device. The EPG information processing apparatus controls the amount of EPG information stored in a database prior to display so that the speed of acquiring EPG information and the speed of supplying EPG information indicating the frequency of using an acquired electronic program guide are kept in a predetermined relation. In response to a direction for updating an on-display electronic program guide, the EPG processing apparatus supplies new EPG information, and stores another piece of EPG information associated with the EPG information in the database prior to next display. The amount of information stored in the database in advance is decided so that the acquiring speed and supplying speed can be kept in a predetermined relation. Therefore, the amount of information stored in advance is raised with increase in the frequency of using an electronic program guide in correlation with the acquired supplying speed, and the amount of information stored in advance is decreased with decrease in the using frequency.2009-06-04
20090144771Electronic service guide broadcaster and method of processing an electronic service guide - The invention relates to a method of processing an ESG of a mobile device is proposed. The method includes the step of storing ESG data for the ESG. The ESG data contains service information data. The service information data comprises location dependent service information data. The method also involves receiving mobile device location data. The received mobile device location data is suitably ready for further processing or may comprise information from which the location data can be determined and/or calculated. The processing of the location dependent service information data is dependent on the received mobile device location data.2009-06-04
20090144772VIDEO OBJECT TAG CREATION AND PROCESSING - An indication of an object included in a frame of a video content item is received. A tag is associated with the object, the tag including a reference to a media content item. An additional frame that includes the object is identified in the video content item. The tag is associated with the additional frame in the video content item.2009-06-04
20090144773Systems and Methods for Segmenting Electronic Program Guide Information - An approach to providing EPG information segments the EPG information into a plurality of segmented EPGs, i.e., subsets of the EPG information. The EPG information for all channels may be segmented into EPGs for separate local channels, i.e., channels received by client devices within a particular geographical region or broadcast area, and a “home” or universal EPG. Alternatively or additionally, the EPG information for all channels may be segmented into EPGs, for example, based on channel content or category.2009-06-04
20090144774SYSTEM AND METHOD FOR NEIGHBORHOOD OPTIMIZATION FOR CONTENT RECOMMENDATION - A cost function is stochastically optimized using, e.g., simulated annealing to render a neighborhood of entities based on which content recommendations can be provided to a user of a home entertainment system. The cost function represents a normalized sum of rating similarity scores from entities of the neighborhood that are related to content items viewed by the user.2009-06-04
20090144775CLIENT AND SERVER SYSTEM - An internet on-demand system for television presents internet content and traditional television programming as part of a single coherent interface. The system includes a server and a client capable of providing a dynamic graphical user interface. The system can display an internet gateway interface which actively scrolls through and highlights links to selected web pages which are organized according to templates corresponding to their content. The web pages are presented on the graphical user interface as channels as part of the same milieu as channels of traditional television programming. The user can select a channel from a rotary menu wheel or via channel-up, channel-down buttons on the remote control device. An intelligent agent passively filters selected web pages for a user to explore based on the user's past pattern of usage of the client. The server queries the client regarding its available data stream connections, including telephone modems, cable modems, wireless telecommunications and digital satellite broadcasting, regarding its ability to detect embedded data in TV signals, in order to determine the most efficient delivery of different types of data through all of the available bandwidth connections for both directions of data flow. The efficient delivery of data allows the client to present text, graphics, video, audio and other multimedia information from a web page over the internet as a coordinated presentation.2009-06-04
20090144776Support for Personal Content in a Multimedia Content Delivery System and Network - A disclosed set top box (STB) suitable for use in presenting multimedia content is operable to receive multimedia content from a provider content source that is remotely connected to the STB via a provider network. The STB is also operable to receive multimedia content from a personal content source. The personal content source is locally connected to the STB or connected to the STB via a public network. The STB is operable to identify a channel indicated by a remote control signal and determine whether the indicated channel is a provider content channel or a personal content channel. The STB streams multimedia content from the first source when the indicated channel is a provider content channel and from the personal source when the indicated channel is a personal channel. The content from the provider content source and the personal content may be received through different STB interfaces. The personal content may be received from a locally connected source.2009-06-04
20090144777REAL-TIME MOST WATCHED GUIDE ORDERING AND GENERATION - Mechanisms are provided for allowing a user to dynamically obtain program guide data and select video content in an efficient and effective manner. A guide generator is configured to obtain program guide information from multiple sources including content providers. The guide generator compiles a real-time most watched program guide by determining viewing patterns associated with various channels and video clips. Channels and video clips requested most frequently are listed first. A real-time most watched program guide including data such as program titles, times, icons, and links is then provided and displayed as needed on client devices. Potentially limitless amounts of program guide data can be provided on a client device while still allowing a user to efficiently and effectively select video content.2009-06-04
20090144778METHOD AND SYSTEM FOR SUPPLEMENTING TELEVISION PROGRAMMING WITH E-MAILED MAGAZINES - An interactive television system and method for generating advertising combined with triggers and then, in turn, for viewing that advertising as the triggers present information associated with the triggers. When triggered by the viewer, the request will retrieve information at the request processing system based on the generated request; and present the retrieved information that is based on the request at a user computer system.2009-06-04
20090144779COMMUNICATION METHOD AND APPARATUS FOR USER TERMINAL - A communication method and apparatus for a user terminal provided in the present invention can detect the user terminal, obtain first capability information on a video communication of a wireless network, and second capability information on the video communication of said user terminal, process the first capability information and the second capability information to generate video communication capability indication information, and select one of operations to perform according to said video communication capability indication information, said operations including enabling a video session or enabling the video session after closing at least a part of applications being used by said user terminal or enabling an audio session. Such a processing scheme of the communication for a user terminal is of high efficiency, with a clear process and can be easily optimized, with an improved success rate for establishing a video session at a time.2009-06-04
20090144780SOCIALLY COLLABORATIVE FILTERING - In one embodiment, a method comprises identifying user selection preferences of an identified user having accessed the network, the identifying based on an accumulation of user selection inputs executed by the identified user, relative to input options presented to the user and identifying respective available network items, the accumulation including an identification of the input options not having been selected by the identified user; determining a group of network users having a highest correlation of shared interests with the identified user, based on identifying preferred network items for the identified user, and identifying first network users providing highest relative user affinity values for each of the preferred network items; and determining at least one of new network items most likely to be preferred by the identified user, based on determining, from among network items not presented to the identifier user, the preferred network items for each of the first network users in the group.2009-06-04
20090144781AUDIO-ON-DEMAND COMMUNICATION SYSTEM - An audio-on-demand communication system provides real-time playback of audio data transferred via telephone lines or other communication links. One or more audio servers include memory banks which store compressed audio data. At the request of a user at a subscriber PC, an audio server transmits the compressed audio data over the communication link to the subscriber PC. The subscriber PC receives and decompresses the transmitted audio data in less than real-time using only the processing power of the CPU within the subscriber PC. According to one aspect of the present invention, high quality audio data compressed according to lossless compression techniques is transmitted together with normal quality audio data. According to another aspect of the present invention, metadata, or extra data, such as text, captions, still images, etc., is transmitted with audio data and is simultaneously displayed with corresponding audio data. The audio-on-demand system also provides a table of contents indicating significant divisions in the audio clip to be played and allows the user immediate access to audio data at the listed divisions. According to a further aspect of the present invention, servers and subscriber PCs are dynamically allocated based upon geographic location to provide the highest possible quality in the communication link.2009-06-04
20090144782SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR STORAGE OF VIDEO VIA IPTV - Systems, methods, and computer products for storage of video via Internet Protocol Television (IPTV) are disclosed herein. Exemplary embodiments include a network-based method for video storage. The method includes receiving a request to store at least one video, retrieving the at least one video through an Internet Protocol television (IPTV) network, and storing the at least one video in a video repository in communication with the IPTV network.2009-06-04
20090144783Broadcast receiver and method for receiving adaptive broadcast signal - A broadcast receiver and method for receiving an adaptive broadcast signal are disclosed. The present invention includes a network interface unit transmitting/receiving an IP packet via a network, a display unit displaying a broadcast signal included in the IP packet, a control unit controlling an available service information list including size information of a program broadcasted from a service provider to be displayed, the available service information list included in the IP packet, the control unit selecting a target bitrate from the size information included in the available service information list, the control unit controlling the selected target bitrate to be sent to the service provider, and a service control manager controlling a reception of the program having the sent target bitrate.2009-06-04
20090144784On demand system and method using dynamic broadcast scheduling - A system and method for broadcasting content includes a content provider which interfaces with one or more clients through a network. The content provider includes a scheduler responsive to requests for content from clients. The scheduler provides the content in blocks by making the blocks available to requesters by a plurality of streams wherein a subsequent requester accesses blocks from previous requester's streams complemented by a subset of blocks as a stream for this requester to complete an entire set of blocks for the subsequent requester. By manipulating the scheduler as a function of user requests, this system and method is able to provide a video on demand service at a fractional bandwidth usage of a conventional VOD system.2009-06-04
20090144785METHODS AND SYSTEMS FOR BROADCASTING MODIFIED LIVE MEDIA - Methods and systems are presented for broadcasting a modified live media feed of an event. In an embodiment, the method includes receiving a live media feed at a broadcast computer from one or more recording devices, wherein the live media feed includes real time occurrences of a live event. The live media feed is broadcast after a predetermined delay, and the method includes identifying, during monitoring of the live event, a portion of the live event that is suitable for application of a modification effect. The process also includes the broadcast computer applying the modification effect to a portion of the live media feed corresponding to the identified portion of the live event, and then broadcasting the modified live media feed.2009-06-04
20090144786METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING MEDIA CHANNEL SERVICES - Methods, systems, and computer program products for providing media channel services are disclosed. A method includes provisioning an Internet-Protocol (IP)-enabled media channel in response to a request to create a media channel account, which includes creating an account record for the media channel account, assigning a media device identifier to the account record, assigning a network address to the IP-based media channel, and storing the network address in the account record. The method also includes populating a storage system with editable and non-editable content. The editable content is received and controlled by a user of the media channel account via a media device, and the non-editable content is controlled by a network media services application. The method further includes creating and presenting a media channel page that includes the editable and non-editable content in response to a request by the user to initiate a session for the channel.2009-06-04
20090144787METHOD AND APPARATUS FOR SEARCHING FOR IPTV SERVICE RELAY DEVICES AND METHOD AND APPARATUS FOR INTERACTING WITH DEVICES - Provided are method and apparatus for searching for a second device relaying at least one IPTV service included in the same residential network as a first device, wherein the searching is performed by the first device, and receiving the IPTV service provided from outside of the residential network through a found second device.2009-06-04
20090144788METHOD AND SYSTEM FOR ACCESSING CONTENT FOR PRESENTATION VIA A SET-TOP BOX - An approach is provided for presenting, via a set-top box, a first media content to a user. The user is prompted with an option to experience a second media content relating to the first media content. The set-top box presents the second media content to the user upon selection of the option by the user.2009-06-04
20090144789SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR STORAGE OF MUSIC VIA IPTV - Systems, methods, and computer products for storage of music via Internet Protocol Television (IPTV) are disclosed herein. Exemplary embodiments include a network-based method for audio storage. The method includes receiving a request to store audio data, retrieving the audio data through an Internet Protocol television (IPTV) network, and storing the audio data in an audio repository in communication with the IPTV network.2009-06-04
20090144790Broadcast receiver and method for receiving adaptive broadcast signal - A broadcast receiver and method for receiving an adaptive broadcast signal are disclosed. The present invention includes a network interface unit transmitting/receiving an IP packet via a network, a display unit displaying a broadcast signal included in the IP packet, a control unit controlling an available service information list including size information of a program broadcasted from a service provider to be displayed, the available service information list included in the IP packet, the control unit selecting a target bitrate from the size information included in the available service information list, the control unit controlling the selected target bitrate to be sent to the service provider, and a service control manager controlling a reception of the program having the sent target bitrate.2009-06-04
20090144791System and Method of Detecting Potential Video Traffic Interference - A method of detecting potential video traffic interference at a video head-end of a video distribution network is disclosed and includes detecting, at a video head-end, a signal populating an ultra high frequency (UHF) white space frequency. The method also includes determining that a strength of the signal is equal to or greater than a threshold signal strength. Further, the method includes sending an alert from the video head-end to a network management system. The alert indicates that the UHF white space frequency is populated by a signal having a potential to interfere with video traffic delivered via the video head-end.2009-06-04
20090144792SYSTEMS AND METHODS OF ADJUSTING BANDWIDTH AMONG MULTIPLE MEDIA STREAMS - Disclosed herein are systems and method for adjusting bitrate among multiple media streams delivered on a common subscriber connection. One such method comprises receiving information describing a maximum bitrate provisioned on the subscriber connection, and receiving a plurality of media streams. Each media stream utilizes a corresponding bitrate, and the plurality of media streams has a combined bitrate. The method also comprises adjusting the bitrate of at least a portion of the plurality of media streams so that the combined bitrate is related to the maximum bitrate provisioned on the subscriber connection.2009-06-04
20090144793METHOD FOR OBTAINING SERVICE MAP INFORMATION, APPARATUS THEREFOR, AND METHOD FOR FAST PERFORMING APPLICATION IN SERVICE ACCORDING TO THE SERVICE MAP INFORMATION - A method for decoding a packetized transport stream containing a service comprising a program and an application is provided. The method includes steps as follows. Firstly, identify a program map information corresponding to the program and an application information corresponding to the application conveyed in the transport stream. Then, assemble at least part of the identified program map information and at least part of the identified application information to obtain a service map information. The service map information associates the program with packet identifiers used to identify individual packets of the transport stream that constitute the program, and associates the application with packet identifiers used to identify individual packets of the transport stream for performing the application. Then, store the service map information. The service map information can be used to identify the individual packets of the transport stream of the service when the service is chosen again.2009-06-04
20090144794System and Method for Allocating Packet Identifiers in a Transport Stream in a Subscriber Network - An apparatus in a digital network includes the logic for allocating and assigning packet identifiers (PIDs) to digital packets, such as MPEG packets. The logic can reside in a device that transmits a transport stream or a device that controls a transport stream transmitter. In the preferred embodiment, a session number is associated a program and with an output port of a transport stream transmitter; and the session number is unique for that output port. The logic associates a PID from a set of allocated PIDs with the session number. The set of allocated PID values are PMT_PIDs, which are used for identifying the PMT packets, and the set of PMT_PIDs is scalable. In the preferred embodiment, the logic also associates the PMT_PID to the session number using a predetermined scheme. The apparatus also includes logic for assigning a set of PID values to the elementary streams of a program. In the preferred embodiment, number of PIDs assigned to the elementary streams of a program is no more than the number of elementary streams of the program.2009-06-04
20090144795SYSTEMS, METHODS, AND COMPUTER PRODUCTS FOR PROVIDING PODCASTS VIA IPTV - Systems, methods, and computer products for providing podcasts via Internet Protocol Television (IPTV) are disclosed herein. Exemplary embodiments include a network-based method for providing digital media podcasts. The method includes receiving a request to render at least one podcast on a communications device authenticated on an IPTV network, retrieving the at least one podcast from the IPTV network, and providing the at least one podcast to the communications device.2009-06-04
20090144796PROCESSING VIDEO STREAMS OF DIFFERENT PICTURE FORMATS - Methods and systems for the efficient and non-redundant transmission of a single video program in multiple frame rates, optionally employing a combination of video coding standards, in a way that is backwards-compatible with legacy receivers only supportive of some subsection of frame rates or of some subsection of video coding standards.2009-06-04
20090144797Method and Apparatus for Delivering SDV Programming With Multiple Advertisements - A set top terminal is provided that includes a receiver/tuner for receiving (i) switched digital video (SDV) programs over a broadband access network, at least one of the SDV programs including a primary advertisement and (ii) a plurality of alternative advertisements that are each substitutable for the primary advertisement. The set top terminal also includes a processor operationally associated with the receiver/tuner. The processor is configured to selectively cause a first of the alternative advertisements to be rendered instead of the primary advertisement when the first alternative advertisement better matches a prescribed condition than the primary advertisement.2009-06-04
20090144798Optimized peer-to-peer mobile communications - A customer can control access to information about the customer stored in a database by selecting one or more policies, where each policy specifies conditions and/or rules for accessing information associated with the policy, and for each selected policy the user selects portions of the customer's information for association with the selected policy. The customer can create or specify one or more policies for accessing information. In another method, information about the customer stored in the database includes personal information about customer, including contact information for people associated with the customer, and facts about the customer, e.g., contact information for family members professionals who provide service (e.g. doctor, lawyer, banker), emergency contacts, medical information, for example blood type, allergies, medications, blood type, organ donor status.2009-06-04
20090144799METHOD AND SYSTEM FOR SECURELY TRANSMITTING DETERRENT DATA - A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data therein, and transmitting a portion of the deterrent data from a subset of the glyphs without transmitting deterrent data from a remainder of the glyphs. The glyphs form a predetermined structure with a single solution. The method further includes receiving the portion of the deterrent data, placing the portion of the deterrent data into the subset of the glyphs, and solving the predetermined structure with the single solution, thereby determining the remainder of the glyphs to be infilled in the predetermined structure with deterrent data gleaned from the solution.2009-06-04
20090144800AUTOMATED CLUSTER MEMBER MANAGEMENT BASED ON NODE CAPABILITIES - Embodiments of the present invention provide a method, system and computer program product for automated cluster member management based on node capabilities. In one embodiment of the invention, a method for automated cluster member management based on node capabilities can be provided. The method can include defining a membership policy for a cluster, the membership policy specifying a nodal configuration required for a node in a cluster. The method further can include evaluating different nodes in a computing environment against the membership policy for the cluster. Finally, the method can include associating cluster members in the cluster to only those of the nodes having respective configurations meeting the nodal configuration of the membership policy. Likewise, the method can include evaluating nodes already in the cluster, and disassociating cluster members in the cluster from those of the nodes having respective configurations failing to meet the nodal configuration of the membership policy.2009-06-04
20090144801METHODS AND SYSTEMS FOR SEARCHING FOR SECURE FILE TRANSMISSION - Described herein are methods and systems for managing and controlling the distribution of digital media. A first media file is associated with first media content and with first metadata providing one or more rules constraining how and/or what second media content can be played in conjunction with the first media content. Optionally, included in the first media file is a locator associated with the second media content which is to be accessed over a network when the first media content is played via a terminal player which receives the first media file.2009-06-04
20090144802Large scale identity management - Methods of designing, structuring and operating an Identity Management provisioning solution over multiple sets of hardware/software platforms are organized by “area of expertise” to better utilize IdM deployment and support team resources for subject matter expertise, improving quality, consolidating resources, and significantly reducing the cost of IdM deployment and operation, across the entire MSP customer base. For example, IdM events originate in a source system platform and flow into a large scale Identity Management infrastructure platform, where IdM event filtering occurs, source system lookups or source system exports occur, provisioning policies or rules are applied to determine which accounts and/or entitlements need to be provisioned or de-provisioned in target connected systems, and target system imports are executed to accomplish the provisioning or de-provisioning activities.2009-06-04
20090144803Computer-Implemented Method for Role Discovery and Simplification in Access Control Systems\ - A method includes selecting a first biclique role in a plurality of roles and finding all roles in the plurality that have a set of vertices of a second type that is a subset of a set of vertices of the second type in the first role; removing each of the subsets from the set of vertices of the second type corresponding to the first role; and reassigning the vertices of the first type to the roles such that original associations between the vertices of the first type and the vertices of the second type are maintained.2009-06-04
20090144804METHOD AND APPARATUS TO SUPPORT PRIVILEGES AT MULTIPLE LEVELS OF AUTHENTICATION USING A CONSTRAINING ACL - Embodiments of the present invention provide systems and techniques for creating, updating, and using an ACL (access control list). A database system may include a constraining ACL which represents a global security policy that is to be applied to all applications that interact with the database. By ensuring that all ACLs inherit from the constraining ACL, the database system can ensure that the global security policy is applied to all applications that interact with the database. During operation, the system may receive a request to create or update an ACL. Before creating or updating the ACL, the system may modify the ACL to ensure that it inherits from the constraining ACL. In an embodiment, the system grants a privilege to a user only if both the ACL and the constraining ACL grant the privilege.2009-06-04
20090144805INFORMATION TRANSFER APPARATUS AND CONTROL METHOD THEREOF - According to one embodiment, when a power source of an information transfer apparatus is turned off, information indicating termination of authentication with an AV apparatus externally connected is stored and whether or not the AV apparatus is set in a disconnected state in a power-off period is detected. Then, in a case where it is detected that the AV apparatus is not set in the disconnected state in the power-off period when the power source is turned on, a digital signal is transferred with respect to the AV apparatus based on the stored information indicating termination of authentication.2009-06-04
20090144806Handling of DDoS attacks from NAT or proxy devices - A method for authenticating communication traffic includes receiving an initial incoming message, sent over a network from a source address to a destination address. In reply to the initial incoming message, an outgoing message containing an encoded token is sent to the client. Upon receiving a number of further incoming messages from the source address containing the encoded token, delivery of one or more of the further incoming messages to the destination address is inhibited when the number exceeds a predetermined threshold.2009-06-04
20090144807METHOD, APPARATUS AND SYSTEM FOR IMPLEMENTING ACCESS AUTHENTICATION - The method, apparatus and system for access authentication include: the network node sends the authentication information to the authentication server, the authentication server deals with the authentication process. When the authentication is successful, the network node is trusted. The UE may send authentication information through the trust node to the authentication server, and the authentication server deals with the authentication process. At the same time, the trust node controls the UE according to the information, which is from the policy server. So the NSP may account to the different users according to the different services, and prevent the illegal action, and the network node may deal with local monitoring according to the policy information.2009-06-04
20090144808Collaborative Learning Space Portal - The embodiments of present invention provide a method of providing online community portal to improve communication and collaboration among authorized users of a wide range of learning communities of the portal and further presenting and sharing the information from diverse sources in a unified way. Collaborative learning space is created by authorized user based on the preference and administrative privileges provided to user and metadata is attached to the learning space. Users with similar profiles are invited the learning space through automatic pattern match and search. The authorized user of the learning space can interact, communicate, and collaborate, co-ordination and share the knowledge and data with other users of the learning space.2009-06-04
20090144809INFRASTRUCTURE-LESS BOOTSTRAPPING: TRUSTLESS BOOTSTRAPPING TO ENABLE MOBILITY FOR MOBILE DEVICES - Methods and apparatus for supporting a session in Mobile IP are disclosed. A Mobile Node sends a first Mobile IP message identifying the Mobile Node to a Home Agent, wherein the first Mobile IP message indicates to the Home Agent that the Mobile Node is requesting dynamic configuration of a Mobile-Home authentication key to be shared between the Mobile Node and the Home Agent during the session. A Mobile-Home authentication key to be shared between the Home Agent and the Mobile Node is obtained or generated by the Mobile Node and the Home Agent, where the Mobile-Home authentication key is not valid after the session has ended or during another session. The Home Agent sends a second Mobile IP message to the Mobile Node, the second Mobile IP message including a lifetime associated with the session, wherein the lifetime indicates a lifetime of the key, thereby enabling the Mobile Node to register with the Home Agent using the Mobile-Home authentication key to be shared between the Home Agent and the Mobile Node during the session.2009-06-04
20090144810METHOD AND APPARATUS FOR PROVIDING AUTHENTICATION - A method and apparatus for providing authentication are disclosed. For example, the method receives a request from a customer to access a service via a first user endpoint device, and sends a first authentication request to the customer for first authentication information. The method then sends a second authentication request to the customer for second authentication information via a second user endpoint device if the first authentication information is received, wherein the first user endpoint device is different from the second user endpoint device. The method then enables the customer to proceed with accessing the service if the second authentication information is received.2009-06-04
20090144811CONTENT DELIVERY SYSTEM - The selection of video content to be delivered to a video reproducing terminal is enabled from a communication terminal with WEB function without exposing a user ID. When a terminal makes a transfer request of content data, a web server requests a delivery management server for a transfer ID. The delivery management server issues the transfer ID each time the request is made and transmits it to the web server. The web server transmits the content data to a delivery server. The delivery server stores the content data from the web server correspondingly to the transfer ID. When receiving a delivery request including a transfer ID inputted to a video reproducing terminal from the video reproducing terminal, the delivery server reads the content data corresponding to the received transfer ID, and transmits it to the video reproducing terminal.2009-06-04
20090144812ENTRY AUXILIARY APPARATUS, ENTRY AUXILIARY SYSTEM, ENTRY AUXILIARY METHOD AND ENTRY AUXILIARY PROGRAM - An entry auxiliary apparatus includes: an authentication entry detection unit, an adequacy determination unit and an entry auxiliary unit. The authentication entry detection unit detects a first authentication server URL included in data of a web page displayed. The adequacy determination unit compares the first authentication server URL with a second authentication server URL included in login information indicating an input history of authentication information and a third authentication server URL included in a service group. The service group, which includes a group of authentication server URLs locating authentication servers that authenticate with an identical authentication information, is related to the login information. The adequacy determination unit relates the login information to an adequacy level depending on a result of the comparison. The entry auxiliary unit assists input of authentication information into the web page based on the login information and the adequacy level.2009-06-04
20090144813METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS - Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.2009-06-04
20090144814Automated Credentialing for Physicians and Other Professionals - An automated system for credentialing physicians or practitioners in other professions employs a databank of verified practitioner data on a central computer server. The file for each practitioner can include education, employment history, board certification record, and derogatory information, such as disciplinary proceedings, if any. A remote computer station can access the central computer server to download a credentialing profile on the computer screen. The computer station can have an RFID reader for inputting a practitioner identity code that uniquely identifies the respective practitioner. There may be RFID tags embedded in diplomas or certificates to aid in verifying authenticity.2009-06-04
Website © 2025 Advameg, Inc.